3. Ransomware has quickly emerged as one of
the most dangerous cyberthreats facing both
organizations and consumers, with global
losses now likely running to hundreds of
millions of dollars.
—Symantec Corp., “ISTR [Internet
Security Threat Report] Special
Report: Ransomware and
Businesses 2016,”
4. Insecurity Everywhere
• “91% of…board members [surveyed] said they can’t read a
cybersecurity report and are not prepared to handle a major attack.”
• “40% said they feel no responsibility for the consequences of being
hacked.”
• “[Hacking] is costing the U.S. $5 trillion each year, or approximately
one-third of our country’s GDP annually.”
• “90-95% of all hacking begins with a phishing email.”
21. The LANDESK Portfolio
S e c u r e
C o n f i g u r a t i o n
M a n a g e m e n t
As s e t
M a n a g e m e n t
S e r v i c e
M a n a g e m e n t
U n i f i e d
E n d p o i n t
M a n a g e m e n t
innovative, proven, consistent, customer-driven technologies
23. Up to 85 percent of targeted attacks are
preventable by:
• application whitelisting;
• patching of applications;
• patching of and operating systems; and
• restricting of administrative privileges.
—Australian Signals Directorate (ASD)
(their equivalent of the US NSA)
24. Everybody works in security now.
—Dan Lutter, Director, Field
Technology Services, Advocate
Health Care
26. Thanks. Let’s Talk.
Michael Dortch
michael.dortch@landesk.com
(US) 415-310-6480
@DortchOnIT
Phil Richards
phil.richards@landesk.com
(US) 801-208-1642
https://www.linkedin.com/in
/phil-richards-3870402
Editor's Notes
Let’s look at a few industries of interest to us here at LANDESK from a security perspective.
But how and why do these threats succeed? What happens when a phishing email or some other threat arrives at an unsuspecting computer system? Well, there’s no one better to help provide some answers than our own CSO, Phil Richards. So, Phil, thanks for joining us.
Clearly, there are serious vulnerability, knowledge, and perception gaps challenging security at all sizes and types of organizations. These shortcomings contribute to inconsistent, “siloed” service management, within and beyond IT. One of the most obvious examples of this is the gap between security and operations.
LANDESK improves ITAM, ITSM, and security, brings them closer together, and makes them more operationally focused. LANDESK helps to bridge the gaps separating ITAM, ITSM, security, and “the business.” How we do these things is by focusing on four areas.
We automate functions that increase visibility and manageability, such as discovery and inventory, critical functions for effective security, as well as for ITAM and ITSM. We also automate fundamental ITAM, ITSM, and security management tasks, to eliminate repetition-driven errors and inconsistent policy compliance.
LANDESK solutions also enable and accelerate consolidation of critical information, to eliminate silos and “hand-off” errors and drive the evolution of “ITxM.”
LANDESK technologies also enable multiple types of information visualization, to make ITAM, ITSM, and security data more easily and quickly actionable. This is an example of one of the reports our Protect product creates, and you can see how much granular data is summarized and visualized here.
Beyond visualization, LANDESK is increasingly delivering technologies that enable personalization—role-based alignment of task requirements and information/service delivery. Our Workspaces offerings, for example, tailor and deliver information differently for asset managers, security admins, end users, executives, and other specific roles, to make tasks such as ITAM and security management more operationally focused. And with our recent acquisition of AppSense, we’ll soon be able to personalize client virtual instances, which will aid in license management.
LANDESK technologies are designed and delivered in ways intended to align with specific user needs, and to evolve as those needs evolve. We don’t do everything, but we do well what our customers tell us matters most to them, and interoperate with the other tools and resources those customers use to enable the levels of IT management and security their enterprises need.
We also offer more than products: enterprise-class professional services, a strong and growing partner ecosystem, a vibrant user community, and decades of real-world experience.
We are uniquely positioned to help with all of these functions, and to bring security and other critical functions such as ITAM and ITSM closer to each other and to “the business.”
Dan Lutter is a member of our Product Advisory Council and our Enterprise Customer Council. He spoke these words at this year’s Interchange, our annual user conference. If you remember nothing else, remember this quote, and let it drive your efforts to make and keep your enterprise more secure. Starting now.